PCI Compliance Tips COVID and Small Merchants by PCI SSC

PCI Compliance Tips from PCI SSC

OTI Contactless Credit Card Reader

OTI Contactless Credit Card Reader

From PCI SSC –  The COVID-19 pandemic is quickly changing how many small merchants accept payments. Merchants that previously only had brick-and-mortar locations are moving to accept e-commerce and over-the-phone transactions. PCI Security Standards Council shares key
considerations to help small merchants keep their customers’ payment data secure in this rapidly changing environment.

One tip from Kiosk Industry Group is to understand and know what access, if any, your vendors and supply chain have access to.  The Target breach for example was due to a vendor using out-of-date free Malware protection on their PC and getting in via Microsoft infrastructure.

TIP #1: REDUCE WHERE PAYMENT CARD DATA CAN BE FOUND

The best way to protect against data breaches is not store card data at all. Many small merchants are offering curbside pickup now and are accepting telephone payments in lieu of former face-to-face transactions. Avoid writing payment card details down and instead enter them directly into your secure terminal. More Information: PCI SSC Special Interest Group Paper: Accepting Telephone Payments Securely

TIP #2: USE STRONG PASSWORDS

The use of weak and default passwords is one of the leading causes of payment data breaches for businesses. To be effective, passwords must be strong and updated regularly. Weak and vendor default passwords are a frequent source of small merchant breaches. More Information: Strong Passwords Infographic

TIP #3: KEEP SOFTWARE PATCHED AND UP TO DATE

Criminals look for outdated software to exploit flaws in unpatched systems. Timely installation of security patches is crucial to minimize the risk of being breached. One way to keep up with all the necessary changes is by ensuring vulnerability scans are performed regularly to identify security issues. PCI Approved Scanning Vendors (ASVs) can help you identify vulnerabilities and misconfigurations in your Internet-facing payment systems, e-commerce website, and other systems, providing a report of your vulnerabilities and how to address them—for example, what patches to
apply. Be sure to act upon the results of ASV vulnerability scans and keep your software up to date. More Information: Patching Infographic

TIP #4: USE STRONG ENCRYPTION

Encryption makes payment card data unreadable to people without a specific key, and can be used to protect stored data and data transmitted over a network. Ask your vendor whether your payment terminal encryption is done via a Point-to-Point Encryption solution and is on the PCI SSC’s List of PCI P2PE Validated Solutions. If you are setting up a new website, confirm the shopping cart provider is using proper encryption, such as TLS v1.2, to protect your customers’ data. More Information: Information Supplements on Use of SSL/Early TLS

TIP #5: USE SECURE REMOTE ACCESS

To minimize the risk of being breached, it’s important that you take part in managing how and when your vendors can access your systems. Criminals can gain access to your systems that store, process, or transmit payment data through weak remote access controls. You should limit use of remote access and disable it when not needed. If you must allow remote access, ask your vendors to use multi-factor authentication and strong remote access credentials that are unique to your business and not the same as those used for other customers. More Information: PCI SSC Secure Remote Access Infographic

TIP #6: ENSURE FIREWALLS ARE CONFIGURED PROPERLY

A firewall is a device or software that sits between your network and the Internet. It acts as a barrier to keep traffic out of your network and systems that you don’t want and didn’t authorize. Firewall rules can seem complex, but configuring them properly is vital to security. If you require additional assistance to properly configure your firewall, seek help from a network professional. More Information: Resource for Small Merchants: Firewall Basics

TIP #7: THINK BEFORE YOU CLICK

Hackers use phishing and other social engineering methods to target organizations with legitimate-looking emails and social media messages that trick users into providing confidential data, such as payment card number, merchant account number or password. Small merchants should be extra vigilant and be on the look out for common phishing and social engineering hacks. More Information: Beware of COVID-19 Online Scams and Threats

TIP #8: CHOOSE TRUSTED PARTNERS

It’s critical you know who your service providers are and what security questions to ask them. Is your service provider adhering to PCI DSS requirements? For e-commerce merchants (and those of you that recently started accepting e-commerce payments in lieu of face-to-face payments), it is important that your payment service providers are PCI DSS compliant, including the service provider that manages your payment process (your “payment service provider” or PSP). More Information:

Additional Links

Relevant PCI Compliance Member Links

PCI Compliance – Payment Card Security Requirements PTS POI – November 2020

PCI SSC Technical FAQs for use with Version 6

UCP Unattended Payments

UCP Unattended Payments is a PCI Compliance expert

A new November update to the PCI SSC Technical FAQs has been issued. It is listed below. We have also listed some other interesting questions.

For a full copy of this document, it is provided by the PCI Security Standards Council

November 2020: POI devices must support one or more of four specified techniques for the loading of private or secret keys. Methods a and b are for plaintext key loading and methods c and d are for encrypted key loading. The requirement specifies that EPPs and OEM PEDs intended for use in an unattended environment shall only support methods a, c, and d. It further specifies that SCRPs shall only support the loading of encrypted keying material. Are there any other restrictions?

A Yes. For all new evaluations (i.e., evaluations that result in a new approval) of POI v5 devices, the POI devices must support at least one of the encrypted key loading methods for the loading of private or secret keys

Requirement A9 stipulates that the device must provide a means to deter the visual observation of PIN values as they are being entered by the cardholder. What methods are acceptable?

A The POI Security Requirements provide for several options that may be used separately or in combination to provide privacy during PIN entry. These options are: ▪ A physical (privacy)shielding barrier. Note that in case the privacy shield is detachable, a user’s guide must accompany the device that states that the privacy shield must be used to comply with ISO 9564. Optionally, the user’s guide can also reference PCI device requirements; ▪ Designed so that the cardholder can shield it with his/her body to protect against observation of the PIN during PIN entry, e.g., a handheld device; ▪ Limited viewing angle (for example, a polarizing filter or recessed PIN pad); ▪ Housing that is part of the ATM or kiosk, cardholder’s hand or body (applies to handheld devices only); and ▪ The installed device’s environment.

May (update) 2018: PIN entry devices may physically integrate in the same device other functionality, such as mobile phone, PDA capabilities or POS terminal. Handheld configurations of PIN entry devices may accommodate the attachment (e.g., via a sled, sleeve or audio jack) of a mobile phone, PDA or POS terminal, where the attached device communicates with the PED. Such a configuration appears as a single device, with separate interfaces for input by the clerk and cardholder. What considerations must be taken into account for either of these configurations?

A For any device where the cardholder is expected to use the same interface for PIN entry as the clerk would use for phone, PDA, payment application, etc. purposes, or where there are multiple interfaces in a single integrated device, the integrated device must be physically and logically hardened in accordance with the PTS POI security requirements. In a handheld configuration with an attached device, there is a risk that the cardholder enters the PIN on the wrong interface. Furthermore, the communication interface between the PED and the attached device may give the latter access to MSR functions without cryptographic controls, allowing skimming of card account data. In this integration model, then either: ▪ Both devices are assessed and validated as compliant to the PTS POI requirements, or PCI PTS POI Evaluation FAQs – Technical – For Use with Version 6 November 2020 Copyright © 2013-2020 PCI Security Standards Council, LLC. All Rights Reserved Page 8 ▪ The PED device, which must also control the card reader(s), must implement and be validated against the PTS POI SRED module. The PED must enforce SRED functions for encryption of card data at all times. The PED is only allowed one state, and that is to encrypt all account data. It cannot be configured to enter a state where account data is not encrypted.

May (update) 2018: PIN Entry Devices that attach to a mobile phone, PDA or POS terminal via a sled, sleeve, audio jack, or wireless connection are required to support SRED. Does this apply to PEDs that are integrated with other devices (such as a tablet or mobile phone) that appear as a single device?

A Yes. An integrated device is one where two physically and electronically distinct devices (e.g., a PED and a commercial off the shelf (COTS) device such as a mobile phone) appear as a single device through the use of the plastics to mask the connectivity. In such a configuration, there is a risk that the cardholder enters the PIN on the wrong interface. Furthermore, the communication interface between the PED and the integrated device may give the latter access to card reader functions without cryptographic controls, allowing skimming of card account data. In this integration model, then either: ▪ Both the PED and non-PED are assessed and validated as compliant to the PTS POI requirements, or ▪ The PED, which must also control the card reader(s), must implement and be validated against the PTS POI SRED module and be both physically and electronically distinct from the non-PED system (for example, it is not acceptable to have the PED firmware execute within the same processor as the non-PED firmware). The PED must enforce SRED functions for encryption of card data at all times. The PED is only allowed one state, and that is to encrypt all account data. It cannot be configured to enter a state where account data is not encrypted. The Security Policy must also state that the non-PED has not been assessed under the PCI PTS program and security guidance is required to ensure the secure operation of the solution. An additional note will be added to the portal noting that the non-PED has not been assessed under the PTS program.

October 2018: Are there minimum requirements for the version of Android to be used within a PTS device?

A Yes, it is expected that the Android version is officially supported with security patches, at a minimum. Any reports, including deltas, where the Android version is not supported with regular security patches will be rejected. Where these patches are not provided by Google, evidence of security patches (implemented at least monthly) provided by the vendor must be documented in the report provided by PCI; evidence for this is expected to be validation of the update code by the laboratory for at least two previous patches, as well as validation by the laboratory that these patches have remediated existing known vulnerabilities in the version of Android used. Vendors should note that this means that consideration for the future patch status of any Android version used must be made during the initial design stages of the device, to prevent unexpected rejection of devices after an Android version becomes unsupported during the development of a solution.

 

What vulnerabilities must be taken into account for a touchscreen?

A If the sides are accessible, an overlay attack utilizing a second, clear touchscreen could be a problem. The connection/path from the touchscreen to the processor (and any devices used for decoding the signals in between) needs to be verified to be secure. Bezels around the touchscreen are especially dangerous because they can conceal access to areas of concern that are described above. The API for firmware and applications (if applicable) needs to be looked at carefully to determine the conditions under which plain-text data entry is allowed. Example: It should not be possible unless under acquirer display prompt-controlled devices, for a third party to display an image (JPEG) that states “press enter when ready for PIN entry” and then have a plain-text keypad pop up on the next screen. The extra caution is warranted for touchscreen devices because of the desire to make touchscreen devices user-friendly and to run many different, unauthenticated, uncontrolled applications. This is especially true for the devices that are intended to be held because of the tendency to regard them as a PDA that can perform debit transactions.

February (update) 2014: Does the use of protective keypad overlays impact the approval status of a device?

A Yes. In general, overlays are not supported by the device approval program due to the potential for keypad tapping or hiding tamper evidence. Overlays may be used where they do not cover any portion of the PIN entry area. For example, in a touchscreen device where the touchscreen is used for both signature capture and PIN entry, an overlay may be used to protect the signature area from excessive wear. In this example only the area used for signature capture may be protected. The material used must be transparent, and not merely translucent, so as not to obstruct the key-entry area when viewed from any angle

Some devices ship with firmware that may be convertible into a compliant version but is not compliant as shipped. When is this acceptable?

A This is only acceptable where the conversion is one way and cannot be reversed. A device can only be converted to a compliant version. It shall not be capable of converting a compliant version to a non-compliant version. The conversion must be performed at the initial key loading of the acquiring entity’s secret keys. The transformation must result in the zeroization of any previously existing acquiring entity secret keys. The compliant version of firmware must be clearly distinguishable from the non-compliant version. Merely appending a suffix (one or more characters) to an existing firmware version is not acceptable. Rather the conversion must result in a high order version number that is clearly distinguishable to purchasers of such devices. Only the compliant version shall be approved and listed.

January 2015: There are a number of FAQs on the use of wireless technologies, such as Bluetooth and Wi-Fi. What is the intent of these FAQs, and does PCI have any specific requirements for other types of communications technologies?

A The intent of the FAQs on all wireless communications for POI devices is to ensure that the interfaces of the POI are protected such that: ▪ Card data cannot be easily intercepted. ▪ Command interfaces to the terminal cannot be easily accessed, intercepted for attack (such as MITM), or used as an attack vector into the device. ▪ Compromise of the interface does not lead to, support, or facilitate further compromise of security assets of the POI. PCI does not mandate or require the use of any specific communication technology, but any implementation must meet the above requirements through some aspect of the physical or logical layers of communication. Physical or direct wired communication often achieves this through the nature of its physical interface. Wireless communications cannot rely on this and therefore must rely instead on security at the link or application layers through use of a Security Protocol to establish a trusted path for all communications over the wireless link. This Security Protocol must have been tested and approved under the open-protocols module of the PCI PTS evaluation of that device, and examples of acceptable Security Protocol implementations include WPA2 (implemented at the link layer), or VPN encrypted tunnels (implemented at the application layer)

December (update) 2016: Can a PTS device be used as a beacon (iBeacon or BLE beacon) transmitter?

A Beacons for any version of BLE (e.g., 4.0, 4.1) are allowed providing the following conditions exists and are validated by a PTS approved lab: ▪ The beacon is listed as a device interface in the PTS POI report. ▪ Over the Air (OTA) provisioning is not allowed at any time. Provisioning and updating of beacons must be consistent with existing PTS standards. (i.e., Section J, B4 or B4.1) ▪ Must be referenced in the security policy. ▪ Beacons are transmit-only. The lab must validate that BLE communication cannot be used to respond to any external requests, connect, pair, or otherwise provide two-way communication to any other device. ▪ The vendor provides documentation on the secure use and provisioning of the beacon and that the documentation clearly states the beacon is used for transmit only, and that OTA provisioning is not allowed. ▪ The vendor will document the purpose of use of the beacon functionality⎯i.e., its intended use. The documentation must include what data is transmitted and ensure that no sensitive data can be transmitted. ▪ The PTS device is never allowed to receive beacon transmissions.

Additional Links

Relevant PCI Compliance Member Links

ADA Checklist Kiosks ADA and PCI – April 2021

ADA Kiosk Checklist Kiosks

Current updated page located at the Kiosk Association KMA March 2021 —  It also includes 4 different images from US Access Board on different reach parameters and distances that need to be observed. To be sure this is only the top-level “first things first” list.  Suits are generally initiated by blind people and so naturally audio and tactile are top of the list. Ideally you have multiple tests of multiple transactions by a blind person in a wheelchair.  That’s our advice.

ADA Checklist 

General Topics 

Hardware
  1. Spacing — Depth, Clearance, Maneuvering, Protruding Objects
  2. Reach Ranges
  3. Interface considerations or Operable Parts
  4. Alternate navigation – user controls and aids such as Braille, AudioPad, NavPad
  5. Hardware assistive device inventory – audio jack (3.5mm) and tactile component?
Software
  1. Does your application extend to audio (Example: ICT with a display screen shall be speech-output enabled for full and independent use by individuals with vision impairments or language.)
  2. Have you tested for The Big Seven – captions, contrast, audio, focus, target size, errors and labels
Devices
  1. Do you incorporate any assisted technology products – face devices (AudioPad/Navpad + Braille label sticker)
  2. Have you reviewed the privacy and security characteristics?
Testing
  1. Have you had people with disabilities perform the top ten tasks?  – Wheelchair, Blind, Hearing-impaired, Sight-impaired, dexterity, quadriplegic e.g.
Installation
  1. Is there sufficient space, protruding, and maneuvering space?
  2. Have you looked at full-day cycle of sunlight, lighting and any other environmental factors (ambient noise e.g.)
Notes:
  • Did you answer No to any of the questions?  
  • Providing accessibility is not cost-prohibitive. A simple NavPad provides tactility as well as audio and if you look at legal incidents, audio is the prime remediation with tactility as well.
  • What about WCAG? — This comes up. 2.1 is the current standard.  WCAG is applied to non-web documents and non-web software, but only when the software is running on platforms that are not “closed”.  Kiosks, of course, typically are closed, and so (from a 508 perspective), the WCAG 2.0 SC is never applied. The relevant areas of 2.1 are already addressed in Section 508.
  • What about a screenreader? Do I need one? — Provide speech output and you are fine. Common ATP devices provide audio output e.g.
  • See the KMA Frequently Asked Questions for plain english yes, no’s and the usual “its complicated”
Resources

 

ADA Checklist 2021 -040221

Related Images Showing Reach Parameters 

knee and toe ada-04

Website ADA Compliance – NFB and AccessiBe in the News

From NBC News May 2021 — Note too that KMA.global provides an accessibility widget for our site to assist in small ways.

Blind people, advocates slam company claiming to make websites ADA compliant

blind access logo

blind access logo

“If you have a website, do you want to include disabled people or do you want to exclude them? That’s why it’s a civil right,” one expert said.

Throughout the pandemic, as blind people, like everyone else, became increasingly dependent on websites to purchase goods, one of the fastest-growing companies that works with clients like Oreo cookies and Energizer batteries to make their websites more accessible has been engulfed in an increasingly contentious relationship with blind people. Many blind people say its product is making it harder for them to navigate the web.

In recent months, blind people and disability advocates have been speaking out on social media and suing companies that use AccessiBe. Blind people say AccessiBe, which is supposed to automatically make websites more compatible with the screen readers blind people rely on to access the internet, has prevented them from all sorts of normal activities online, like paying rent, teaching a class or buying Christmas gifts.

AccessiBe is the largest automated accessibility company on the market, according to Lucy Greco, who is blind and the head of web accessibility at the University of California, Berkeley.

The situation has gotten so bad that in the past two months more than 400 blind people, accessibility advocates and software developers signed an open letter calling on companies that use automated services, like AccessiBe and other companies with similar products, to stop.

“We will refuse to stay silent when overlay vendors use deception to market their products,” the letter said.

Read full news article From NBC News May 2021

Excerpts from Related letter

Introduction, definition, and history of web accessibility overlays

Overlays are a broad term for technologies aimed at improving the accessibility of a website by applying third-party source code (typically JavaScript) to make improvements to the front-end code of the website.

Website add-on products purporting to improve accessibility go back to the late 1990s with products like Readspeaker and Browsealoud. Both of which added text-to-speech capabilities to the website(s) on which they were installed.

Later, similar products came to market that added additional tools to their software that allow user-based control of things like font-sizes and changes to the web pages colors so that contrast is improved. Products like Userway, EqualWeb, AudioEye, User1st, MaxAccess, FACIL’iti, Purple Lens, and accessiBe fall into this category. These products are sometimes also white labelled under additional names and the above is not an exhaustive list of products with which this Fact Sheet is aimed at.

Fitness for achieving compliance with accessibility standards

While the use of an overlay may improve compliance with a handful of provisions in major accessibility standards, full compliance cannot be achieved with an overlay.

Among the many claims made by overlay vendors is the claim that the use of their product will being the site into compliance with accessibility standards such as WCAG 2.x, related and derivative standards, and laws that mandate compliance with those standards.

Conformance to a standard means that you meet or satisfy the ‘requirements’ of the standard. In WCAG 2.0 the ‘requirements’ are the Success Criteria. To conform to WCAG 2.0, you need to satisfy the Success Criteria, that is, there is no content which violates the Success Criteria.Understanding WCAG 2.1: Understanding Conformance

Given that conformance is defined as meeting all requirements of the standard, these products’ documented inability to repair all possible issues means that they cannot bring a website into compliance. Products marketed with such claims should be viewed with significant scepticism.

Kiosk Association and Major Retail and Restaurant Trade Shows

kiosk association

kiosk association

DENVER, Colo., June 18, 2021 (SEND2PRESS NEWSWIRE) — The Unattended Self-Service and Kiosk Association is participating in two major upcoming events for Retail and Restaurants in the next week – NRF Retail Converge and CREATE by Nations Restaurant News. Learn from speakers such as CVS, Walgreens, Macys, Alibaba and others at Retail Converge. CREATE speakers include Yum! Brands, Chipotle, McDonald’s, Wendy’s, Dominos and many more. Retail Converge begins next week and CREATE has just launched.

Noted sponsors for the Kiosk Association include:

In other news for the Association a resource page for Assistive Technology is now available listing provider companies, noted consequences for not providing and additional resources. A companion page covering the latest Legal News is now available. This page is a running log with personal commentary on legal, privacy and patent situations. We keep track of legal news that affects the unattended self-service market.

Examples this week include the lawsuit against McDonalds for improper use of biometric data and a class action suit against over 125 Wendy’s franchisees for ADA violation. Learn about PPI which is how we abbreviate Prosecution Probability Index. Our new DOJ is expressing interest in cases never before expressed.

Sample News Posts

For more information contact Craig Keefner, 720-324-1837 or craig@catareno.com or you can visit Kiosk industryKMA.globalRetail AutomationDigital BusinessMenu Board SolutionsDigital Signage Solutions and Thinclient

https://kioskindustry.org/

*LOGO link for media:  https://www.Send2Press.com/300dpi/20-0315s2p-kioskma-300dpi.jpg

July News – EMV Liability, California Privacy Enforcement, PCI CAT FAQ

Regulatory News This Month

Outdoor EMV Liability Shift Increasing — A CMSPI analysis found that chargebacks have tripled since January 2021. “If you look at January as the baseline month, May is almost triple of what January was in terms of overall chargebacks. There was a pretty substantial increase of about 50 percent in April, and that really ballooned in May,” Pynn said, explaining that chargebacks are often delayed because it takes some time for the consumer to realize the fraud and file a report. “The feedback loop takes some time.”

EMV liability shifts are not new to the convenience and fuel retailing industry. The in-store EMV deadline occurred in 2015; however, the shift for at-the-pump transactions was pushed back multiple times to April 2021. While the most recent delay was driven by the COVID-19 pandemic, Pynn pointed out that becoming compliant at the pump is a more difficult undertaking than becoming compliant in the store.

“Chargebacks have not only grown in volume, but they have grown in value. The average value of every chargeback hovered somewhere around $50 before April. Then, in April and May, they grew to over $70. That’s an almost 40-percent increase,” he noted.

(Reuters) – The California attorney general’s office started enforcing the California Consumer Privacy Act (CCPA) on July 1, 2020. Does your app or website collect data?

The majority of businesses that received notices from the California Department of Justice of an alleged violation of the state’s privacy law have addressed the issue within the 30-day statutory window, California Attorney General Rob Bonta said on Monday.

The California attorney general’s office started enforcing the California Consumer Privacy Act (CCPA) on July 1, 2020. Since then, 75% of businesses that the state notified acted to comply, while the other 25% are “either within their 30-day window or are under an active investigation,” Bonta said during a press conference about the first year of enforcement of the law.

Under the privacy law, businesses have 30 days to “cure” an alleged violation after being notified, before the attorney general’s office can start an enforcement action.

Read more:

Calif. Attorney General Becerra outlines ABCs of CCPA as enforcement kicks in

New California privacy board includes academics, government and law firm alums

Q&A: What’s next for California Consumer Privacy Act litigation

PCI Compliance Kiosks – CAT or Cardholder Activated Terminals FAQ — Link

There are two primary classifications of Point of Sale Terminal Types: Attended and Unattended Payment Terminals are classified into two major types, depending on the situation:

  1. Attended Terminals
    1. A POS Transaction occurring at an attended POS Terminal is a face-to-face Transaction, since a Sales Person or Representative is present at the time of the Transaction.
  2. Unattended Terminals or Cardholder Activated Terminals (CATs)
    1. A POS Transaction occurring at an unat­tended POS Terminal is a non-face-to-face Transaction, as NO Sales Person or Represen­tative is present at the time of the Trans­action. Examples of unattended POS Terminals include ticket dis­pen­sing machines, vending machines, auto­mated fuel dispensers, toll booths, kiosks, and parking meters.

Saying Yes to a McDonalds, Costco or a Home Depot

Quasi Classification of “Semi-Attended” — This is a gray area coined by processors in order to permit use of Attended Terminals in an Unattended Mode. Typically this is seen by large corporations (e.g. Home Depot, Costco) where they wish to use the same terminals throughout the business case with the same liability. The processors will “concede” to the use but only with additional stipulations for use. Preconditions for obtaining such a classification by the processor is directly related to leverage the corporation may exert. Small business is not in that position.

Webinar: New approaches to web accessibility requirements under WCAG3

WCAG 2.0 Accessibility Webinar

WCAG 2.0 Accessibility Webinar

WCAG 2.0 Accessibility Webinar

The Section 508 Standards apply the Web Content Accessibility Guidelines (WCAG) 2.0 to web content and other electronic content. Issued by the W3C, WCAG 2.0 is a globally recognized, technology-neutral standard. The next webinar in the Section 508 Best Practices Webinar Series will take place July 27 from 1:00 to 2:30 (ET) and will feature new and differing approaches to web accessibility requirements proposed for the next generation of these guidelines, the draft WCAG 3.0, (or WCAG3).

Presenters will discuss various topics, including the purpose of an accessibility standard, digital accessibility and technical requirements, and approaches to developing an accessibility standard. The conversation will include candid discussion about the concerns and difficulties various stake holders have with current web accessibility standards. Section 508 (and EN 301 549) applied the WCAG 2.0 web standards to other digital content, which has implications for the development of WCAG3. Presenters will address both pre-submitted and live session questions.

For more details or to register, visit www.accessibilityonline.org. Questions can be submitted in advance of the session or can be posed during the live webinar. Webinar attendees can receive a participation certificate for attending the 90-minute session.

Registration closes 24 hours before the start of the session. Instructions for accessing the webinar on the day of the session will be sent via email to registered individuals in advance of the session. Communication Access Realtime Translation (CART) and Video Sign Language Interpreters are available for the session and will be broadcast via the webinar platform. A telephone option (not toll-free) for receiving audio is also available.

The Section 508 Best Practices Webinar Series provides helpful information and best practices for federal agencies in meeting their obligations under Section 508 of the Rehabilitation Act which ensures access to information and communication technology in the federal sector. This webinar series is made available by the Accessibility Community of Practice of the CIO Council in partnership with the U.S. Access Board. All webinars are archived and available on the archives webpage.

More Information

We recommend reviewing the Assistive Technology page on Kiosk Industry for applicable tools for Accessibility

New Sponsor – Dolphin Computer Access SuperNova Kiosk Accessibility

Reference link for Dolphin Computer Access

Dolphin Computer Access SuperNova – Make self-service kiosks accessible to people with visual impairments

When you welcome people who are blind or partially sighted to use your self-service kiosks, it’s a win for your customers and a win for your brand.

Deliver a positive experience for all customers and make your self-service stations accessible with SuperNova Kiosks.

More than 30 years of expertise means the Dolphin team of assistive technology specialists are here to help make your kiosk project a success.

A complete solution for all levels of sight.

The World Health Organisation estimates that there are 285 million people who are living with sight loss worldwide. This includes 39 million people who are blind and 246 million people who are partially sighted.

Make your self-service stations accessible for all levels of sight. Choose SuperNova Kiosks and empower people with partial sight to explore the screen in comfort and provide complete access for people who are blind.

What’s included with SuperNova Kiosks?

SuperNova Kiosks provides everything your business needs to make your self-service stations accessible.

Magnification Icon

Crystal clear magnification

Magnification from 1.2 up to 64 times means text on your kiosk display will always look smooth and clear.

 

Touchscreen icon.

Intuitive touch screen magnification

Unrivalled touch screen experience for people with low vision. Explore the screen with one finger, use two to zoom in, or tap three for more options.

 

High contrast colours icon.

High contrast colours

24 accessible colour schemes, carefully designed to reduce glare and maximise comfort for kiosk users.

 

Screen reader icon.

Complete screen reader

Announces all options available on the kiosk screen using human-sounding voices.

 

Keypad icon

Support for Storm AudioNav keypads

Empower people who are blind to explore your kiosks using tactile buttons. SuperNova loads automatically when headphones are inserted, announcing each option on the screen as the user navigates.

 

Customised scripting icon

SuperNova API and scripting

Customise SuperNova for your bespoke kiosk project – choose magnification, speech or both. Work with Dolphin to ensure your kiosk application works seamlessly with speech and magnification.

 

More Info

Partnership icon.A partnership of expertise in assistive technology

Whether you need advice or technical support to deliver an accessible kiosk experience, the Dolphin team of assistive technology experts are here to help.

Right from design stage, your developers can rely on Dolphin’s proven expertise to enhance the accessibility of your kiosk application. Dolphin offers flexible support, service and licensing terms to ensure the long-term success of your kiosk project.

Woman using an airport check-in kiosk with SuperNova magnification on the screen.

For More Information:

[contact-form][contact-field label=”Name” type=”name” required=”true” /][contact-field label=”Email” type=”email” required=”true” /][contact-field label=”Website” type=”url” /][contact-field label=”Message” type=”textarea” /][/contact-form]

WCAG3 Approach — Webinar by US Access Board

w3c wcag accessibility logo

Section 508 Best Practices Webinar: New approaches to web accessibility requirements under WCAG3

Laptop computer sits on desk and has "Webinar" text on its screen

The Section 508 Standards apply the Web Content Accessibility Guidelines (WCAG) 2.0 to web content and other electronic content. Issued by the W3C, WCAG 2.0 is a globally recognized, technology-neutral standard. The next webinar in the Section 508 Best Practices Webinar Series will take place July 27 from 1:00 to 2:30 (ET) and will feature new and differing approaches to web accessibility requirements proposed for the next generation of these guidelines and the draft WCAG 3.0 (or WCAG3).

Presenters will discuss various topics, including the purpose of an accessibility standard, digital accessibility and technical requirements, and approaches to developing an accessibility standard. The conversation will include candid discussion about the concerns and difficulties various stakeholders have with current web accessibility standards. Section 508 (and EN 301 549) applied the WCAG 2.0 web standards to other digital content, which has implications for the development of WCAG3. Presenters will address both pre-submitted and live session questions.

For more details or to register, visit www.accessibilityonline.org. Questions can be submitted in advance of the session or can be posed during the live webinar. Webinar attendees can receive a participation certificate for attending the 90-minute session.

Registration closes 24 hours before the start of the session. Instructions for accessing the webinar on the day of the session will be sent via email to registered individuals in advance of the session. Communication Access Realtime Translation (CART) and Video Sign Language Interpreters are available for the session and will be broadcast via the webinar platform. A telephone option (not toll-free) for receiving audio is also available.

The Section 508 Best Practices Webinar Series provides helpful information and best practices for federal agencies in meeting their obligations under Section 508 of the Rehabilitation Act which ensures access to information and communication technology in the federal sector. This webinar series is made available by the Accessibility Community of Practice of the CIO Council in partnership with the U.S. Access Board. All webinars are archived and available on the archives webpage.

Vaccine Passport HIPAA and More — Who Can Ask For Medical Status?

Vaccine Passport HIPAA

vaccine passport kiosks

vaccine passport kiosks

With the pandemic and now the Delta virus we now have actual vaccine passport kiosks available for sale and deployment. The impact being both on the general public in the role of customer, and with employees coming back to the office to work.

The arguments against disclosing vaccination status have, at times, focused on HIPAA. We have educated people telling people that “due to HIPAA, I cannot disclose my status”.  It’s actually more of Herman Melville Bartleby tactic where the fact is they prefer not to disclose.

The usual applications where HIPAA comes into play for kiosks can be Epic Welcome Kiosks for patient check-in for example, or any type of patient check-in. Generally unit collecting or touching patient information in health care provider, hospitals, nursing home or service providers.  Telehealth kiosks is another example.

Good article discussing.

In brief:

  • #1 — It is not a HIPAA violation to ask someone their vaccine status
  • Who does HIPAA regulate?
    • Health insurance companies, Medicare, Medicaid or employers who run self-funded health plans
    • Business associates, such as health care providers, hospitals, nursing homes or anyone actually delivering a health care service
    • Subcontractors of business associates, such as health care clearinghouses or billing companies that may transfer patient data
  • You can ask. They do not have to answer.
  • Some states are passing “Can’t Ask” laws and conflating them with HIPAA (e.g. home state of Oklahoma)

Article

As we return to learn and work in person, you might be wondering how to talk to others about whether they’ve gotten a COVID-19 vaccine — or if it’s even legal to ask.

When Rep. Marjorie Taylor Greene, R-Ga., was asked last month if she had been vaccinated against COVID-19, she said the question itself was “in violation of my HIPAA rights.”

“You see, with HIPAA rights, we don’t have to reveal our medical records and that also involves our vaccine records,” said Greene, who has previously pushed false claims about vaccines.

“HIPAA applies in many fewer circumstances than people think.”
Actually, that’s not true. “It is not a HIPAA violation to ask someone their vaccine status,” said Kayte Spector-Bagdady, who helps direct the University of Michigan’s Center for Bioethics & Social Sciences in Medicine. “HIPAA applies in many fewer circumstances than people think.”

HIPAA, or the Health Insurance Portability and Accountability Act, protects people’s private health information from being shared by certain health care entities without patient consent. But this 1996 law is far more narrowly defined than most people realize, Spector-Bagdady said.

Here’s what several health law experts say about the relevance of HIPAA and other rules when navigating interactions with others.

What does HIPAA cover?
Most people encounter HIPAA when signing consent forms at their doctor’s office. Typically, that is the extent of their exposure to this law or any other that governs health care and their privacy. So “there’s a lot of misapplication and misunderstanding in terms of what HIPAA does,” said Matthew Fisher, who serves as general counsel for Carium, a telehealth platform company, and has practiced health care law for more than a decade.

Here’s who HIPAA regulates:

Health insurance companies, Medicare, Medicaid or employers who run self-funded health plans
Business associates, such as health care providers, hospitals, nursing homes or anyone actually delivering a health care service
Subcontractors of business associates, such as health care clearinghouses or billing companies that may transfer patient data
That’s it. It doesn’t apply to conversations you might have on the street, said Margaret Riley, a professor of law at the University of Virginia and serves as legal advisor for the school’s Health Sciences Institutional Review Board.

“I can ask you on the street what your vaccine status is. I can ask you in my business what your vaccine status is. If I’m not your supervisor, that’s not a violation because I have no impact on you,” Riley said. “On the other hand, you have no obligation to answer me.”

The National Football League announced late last month it would penalize teams if they had COVID-19 outbreaks among unvaccinated players.

The decision came as more employers mandate that employees get vaccinated against COVID-19 to prevent outbreaks traced back to the workplace, preserving public health and productivity levels in one fell swoop. When New England Patriot quarterback Cam Newton was asked soon after in a news conference if he had been inoculated against the coronavirus, he sidestepped the question: “I think it’s too personal for each and every person to kind of discuss it, and I’ll just keep it at that,” he said.

“If I’m not your supervisor, that’s not a violation because I have no impact on you. On the other hand, you have no obligation to answer me.”
Newton is fully within his rights to not divulge his vaccine status to the news media. But there are many contexts where people might want to know if others with whom they have regular contact have gotten shots.

Claire Talltree, a retired epidemiologist and farmer in Snohomish, Washington, serves on the board of a nonprofit organization that meets regularly to discuss business. During much of the pandemic, those meetings took place virtually, but once vaccines became available and Washington lifted restrictions for social distancing, Talltree said the nonprofit’s board members suggested they all meet in person in restaurants and hold hourslong meetings over meals (which she said typically results in lax mask use). Because she was caring for vulnerable loved ones with compromised immune systems, Talltree, 64, asked if everyone had been vaccinated against COVID-19.

“I’ve been told it’s HIPAA, and they don’t have to tell me,” said Talltree, who added she is getting lots of pushback and has lost friends who died of COVID-19. “They want me to quit being fearful,” she said. “I’m not fearful. I just don’t want to catch this disease.”

Confusion beyond HIPAA
If HIPAA does not prevent you from asking most other people if they are vaccinated, new laws going into effect around the country may contribute to stifling conversation, if indirectly.

State lawmakers have submitted more than 150 bills tied to vaccine passports and mandates for employers and schools, according to the National Academy for State Health Policy. These orders come as the delta variant pushes the number of new infections to more than 100,000 each day — levels last seen in February before vaccines were widely available — and largely affecting unvaccinated swaths of the country.

In Oklahoma, Gov. Kevin Stitt signed into law on May 28 a mandate that prohibits colleges from requiring students to be vaccinated or wear masks, or from asking students if they are vaccinated.

That means that college instructor Dinah Cox, who is fully vaccinated but asthmatic, cannot even request that students in her English class wear a face covering. When classes resume in mid-August at Oklahoma State University in Stillwater, Cox said, she must teach in person in a windowless lecture hall. She is concerned that her preexisting health conditions might complicate an otherwise mild breakthrough infection. She has applied for medical accommodations to continue teaching virtual classes, but Cox said it is unclear if her request will be granted before school starts in mid-August.

“I prefer to teach in person. I just want to be protected when I do so and have my students protected,” she said. But she said she feels she must choose between her job and her health.

These state-based rules are creating confusion beyond what is often — and inaccurately — attributed to HIPAA, Riley said. “In that context, you’re going to have a lot of these conversations when people are seeking ways to protect themselves.”

This response is a “classic American public health response” with critical decisions being made at the “most local level possible,” said Jason Schwartz, an associate professor in the Yale School of Public Health.

“We’ve seen unhelpful restrictions in some states that have limited the ability of institutional leaders at schools, businesses and colleges to have the information they need about risk present in their community and ability to respond to it,” Schwartz said.

During a global pandemic with a highly infectious variant causing more infections, these incremental choices can ultimately hinder greater progress and harm more people, he added.